[intertech] Re: Questions By Module For MPS 3.0

  • From: "Brian Smyth" <mail@xxxxxxxxxxxxxx>
  • To: <intertech@xxxxxxxxxxxxx>
  • Date: Tue, 7 Dec 2004 11:57:32 -0000

And these are the unsorted ones.

-----Original Message-----
From: intertech-bounce@xxxxxxxxxxxxx [mailto:intertech-bounce@xxxxxxxxxxxxx]
On Behalf Of Ann-Marie Irwin
Sent: 07 December 2004 10:19
To: intertech@xxxxxxxxxxxxx
Subject: [intertech] Questions By Module For MPS 3.0

HI

Attached are practice questions by module for the course

-- 
Ann-Marie Irwin
SBC Consultant
Intertech Ireland Ltd
Tel: 0872033704
1. Which feature of the Web Interface for MetaFrame XP allows administrators to 
utilize the IIS TCP/IP port for XML requests eliminating the need for opening 
an additional port? 

A. TLS encryption 
B. SSL encryption 
C. ISAPI extension 
D. Program Neighborhood

Answer: 

2. Which two features are supported in a deployment of the Web Interface that 
includes MetaFrame 1.8 servers with Feature Release 1? (Choose two.) 

A. Ticketing 
B. File type association 
C. TLS/SSL ICA connections 
D. Group and folder based application acquisition 

Answer: 

3. The Web Interface for MetaFrame XP is configured by default to allow users 
to download the ICA clients. What is required to use web-based installation of 
ICA clients with the Web Interface for MetaFrame XP?

A. The clients must be running on a Windows platform.
B. The DefaultClient parameter in the NFUSE.CONF file should be set to off. 
C. The ICA client installation files should be copied to the Web Interface 
server. 
D. The Web Interface for MetaFrame XP must be configured to auto-detect client 
devices and browser types. 

Answer: 

4. The Web Interface for MetaFrame XP supports RSA SecureID integration.In 
order to use this authentication option with an implementation of the Web 
Interface, which file must be copied from the ACE/Server to the Web Interface 
server? 

A. ACL.EXE 
B. NFUSE.CONF
C. SDCONF.REC
D. RSASEC.CONF 

Answer: 

5. Which component in a Web Interface for MetaFrame XP deployment launches 
published applications? 

A. ICA client 
B. Web server 
C. Web browser 
D. Web Interface Java objects 

Answer: 

6. Which component of a Web Interface for MetaFrame XP deployment authenticates 
users?

A. Web server 
B. MetaFrame XP server 
C. Secure Gateway server 
D. Secure Ticketing Authority 

Answer: 

7. Which component of MetaFrame is responsible for sending farm information to 
the server running Web Interface? 

A. ICA Service 
B. IMA Service 
C. Citrix XML Service 
D. MetaFrame COM Service

Answer: 

8. Which component retrieves the user's application set from the Citrix XML 
Service in a Web Interface for MetaFrame XP implementation? 

A. ICA client 
B. IMA service 
C. Web browser
D. Web Interface Java object 

Answer: 

9. Which of the following substitutes the tags in template ICA files for 
user-specific and/or application-specific data in a Web Interface 
implementation? 

A. XML service
B. Web browser
C. Java ICA client 
D. Web Interface Java objects 

Answer: 

10. Which four tasks are performed by the Web Interface Java objects? (Choose 
four.) 

A. Generating customized ICA files 
B. Retrieving template ICA files from the farm 
C. Retrieving user application sets from the farm 
D. Sending customized ICA files to the web browser 
E. Serving as a broker between the web server and the server farm 
F. Launching the application on the MetaFrame Presentation Server

Answer: 

11. Which component sends user's requests for ICA files to the Web Interface 
Java objects? 

A. ICA client 
B. IMA service 
C. Web browser 
D. Citrix XML Service 

Answer: 

12. Which three of the following are provided by the primary XML service to the 
Web Interface Java objects? (Choose three.) 

A. Template ICA files
B. Customized ICA files
C. User's application set 
D. Authentication ticket for the user 
E. IP address of the least busy server on the farm 

Answer: 

13. In an implementation of the Web Interface for MetaFrame XP that contains 
clients, a web server, a Secure Gateway server and a single MetaFrame XP server 
farm which of the following statements is true? 

A. The primary XML service interacts with the web server to launch ICA 
sessions. 
B. The primary XML service interacts with the Java objects to generate 
customized ICA files. 
C. The primary XML service interacts with the ICA client to provide the client 
machine IP address to the farm. 
D. The primary XML service interacts with the Secure Gateway server to 
authenticate external users to the farm.

Answer: 



14. Which of the following actions triggers the retrieval of the template ICA 
file by Web Interface Java objects? 

A. Receipt of an authentication ticket by the client 
B. Approval of the users credentials by XML service 
C. Clicking on a hyperlink within the web page by a user 
D. Forwarding a ticket to the client by the primary XML service 

Answer: 

15. A user logs into the Web Interface for MetaFrame XP page. Which of the 
strings below represent the path that the credentials must travel to 
authenticate the user?

A. web browser/XML service/ web server scripts
B. web browser/web server scripts/ XML service 
C. web browser/Web Interface Java objects/XML service 
D. web browser/web server scripts/Web Interface Java objects/XML service 

Answer: 

16. A company's infrastructure contains internal and external users accessing 
MetaFrame server resources in different domains from the Web Interface. 
Internal users access resources over the LAN whereas employees working in 
remote offices must access resources over a WAN through Secure Gateway. Which 
two options provide the most security for this deployment? (Choose two.) 

A. Assigning public addresses to the MetaFrame servers 
B. Securing communications between Secure Gateway and the STA
C. Placing the Web Interface web server in a DMZ between two firewalls
D. Allowing external users to connect to the Web Interface server using HTTP 

Answer: 

17. In a company, 40% of the external users are consultants who are based at 
other organizations. The consultants use MetaFrame and the Web Interface to 
access resources over the WAN through proxy servers. For the above scenario, 
what should the client-side firewall settings be? 

A. Disable SOCKS proxy settings on the client 
B. Configure the Web Interface to use SOCKS proxy settings 
C. Configure the Web Interface to automatically detect proxy settings 
D. Configure the MetaFrame servers to work with SOCKS proxy servers 

Answer: 

18. Which requirement must MetaFrame XP Servers meet to participate in a Web 
Interface environment? 

A. The MetaFrame XP Servers must have applications published. 
B. The MetaFrame XP Servers must have Feature Release 2 installed. 
C. The MetaFrame XP Servers must have the NFuse 1.0 XML protocol installed. 
D. The MetaFrame XP Servers must exist in the same domain as the Web Interface 
server. 

Answer: 

19. Which three of the following Secure Gateway components can be placed in the 
DMZ? (Choose three.) 

A. Web Interface server 
B. Secure Gateway Proxy
C. Secure Ticket Authority
D. Secure Gateway Service 

Answer: 

20. You have decided to use one NAT firewall with your Web Interface 
deployment. Which three statements are most likely true about your 
infrastructure? (Choose three.) 

A. The enterprise consists of internal users only. 
B. Internal users access MetaFrame resources directly. 
C. The enterprise consists of external and internal users. 
D. The Web Interface server has at least two addresses available for users. 
E. Both internal and external users access the Web Interface using an alternate 
address. 

Answer: 

21. Which four of the following are required to enable users to use the single 
sign-on feature with the Web Interface? (Choose four.) 

A. Internet Explorer 5.0 or later must be used. 
B. The Web Interface server must be an IIS server. 
C. Pass-through authentication must be configured on the client. 
D. Explicit authentication must be used and configured on the Web Interface 
server. 
E. Desktop Credential Pass-Through must be enabled on the Web Interface server. 

Answer: 

22. Scenario: The Web Interface is deployed to provide internal and external 
users access to resources on 5 MetaFrame servers. The external users are 
located in remote offices on the 3.1.x.x subnet and have a trusted partnership 
within the network. Internal users as well as the Web Interface and the 
MetaFrame servers are all located at the office headquarters on the 177.10. x.x 
subnet.

Required Result: Provide all users with a connection to the MetaFrame servers 
using a public translated address EXCEPT internal users who will connect 
directly using the private IP address. Which two configurations should be used 
to produce the required result? (Choose two.) 

A. Set the default address translation setting to normal address 
B. Set the default address translation setting to translated address 
C. Select normal address and specify 3.1 in the Client Address Prefix field for 
the specific address translation settings
D. Select normal address and specify 177.10 in the Client Address Prefix field 
for the specific address translation settings 
E. Select translated address and specify 177.10 in the Client Address Prefix 
field for the specific address translation settings 

Answer:

23. In the settings map on the Server-Side Firewall Settings page of the Web 
Interface Admin tool the variable "123.21=Alternate" is displayed. What does 
this indicate?

A. For the firewall, all components on that subnet will use a translated IP 
address. 
B. For servers on that subnet, a public IP address is used to communicate with 
external clients. 
C. For clients on that subnet, a public IP address is used to access MetaFrame 
servers in the farm. 
D. For clients on that subnet, an alternate internal path is used to access 
MetaFrame servers in the farm. 

Answer: 

24. You need to deploy three Secure Gateway servers and two Web Interface 
servers for redundancy and scalability needs. What must you do? 

A. Configure a third-party load balancer 
B. Make registry modifications to the STA server 
C. Install Secure Gateway Service using the Typical configuration option
D. Install Secure Gateway Service using the Advanced configuration option

Answer: 

25. You and your co-worker are installing Web Interface and Secure Gateway 
today. The tasks have been split so that you are installing Web Interface and 
your co-worker is installing Secure Gateway. Your co-worker installs Secure 
Gateway first, making assumptions about Secure Ticket Authority, and he plans 
to return later to install Secure Ticket Authority but forgets to do so. 
Meanwhile, you attempt to run a test login with a valid user account. What will 
most likely occur?

A. The test user will not be able to access the Secure Gateway login page. 
B. The test user will be presented with application icons after entering 
credentials, then will receive an error message upon launching an application.
C. The test user will be presented with the Secure Gateway login page, 
successfully log in, be presented with the Web Interface page,and will be able 
to access an anonymous application. 
D. The test user will be presented with the Secure Gateway login page, will log 
in successfully, then be presented with the Web Interface page, and will 
receive errors after attempting to access an explicit application. 

Answer: 

26. You are on a tight deadline to deploy Citrix MetaFrame and have discovered 
that an insufficient number of servers were ordered. You plan to deploy four 
MetaFrame servers, as well as Web Interface and Secure Gateway. In light of 
that, you are trying to determine which servers can support multiple functions. 
Which of the following is the least desirable option? 

A. Forsake a dedicated Zone Data Collector. 
B. Install Secure Ticket Authority on a MetaFrame Server.
C. Install Secure Gateway and Web Interface on the same server.

D. Install Secure Ticket Authority and Web Interface on the same server. 

Answer: 

27. You have deployed Web Interface to a group of pilot users in a call center. 
Users report that Web Interface is presented and that the correct applications 
are presented. These users open the Customer Relationship Management (CRM) 
application first thing in the morning. Typically, the users do not access 
other applications throughout the day. On Friday afternoons, the users must 
enter their time sheets through a different application. When they attempt to 
access this application, Web Interface prompts them for a login, and they wish 
to avoid this additional step. What timeout options are available in Web 
Interface? 

A. The timeout can be modified on the web server.
B. The timeout can be modified using the Web Interface Admin tool.
C. The timeout can only be modified by Citrix Consulting Services or a Citrix 
reseller. 
D. The timeout can be modified, but this will require a new installation of Web 
Interface.

Answer: 

28. When installing Web Interface for use in a MetaFrame 1.8 server farm, what 
additional software is required on the MetaFrame servers? (Choose two.)

A. Citrix MetaFrame 1.8 Service Pack 2 or 3 
B. Citrix MetaFrame 1.8 Service Pack 1 or 2 
C. Installed and activated Feature Release 1 license 
D. Installed and activated Feature Release 2 license 

Answer: 

29. An administrator is implementing the Web Interface for MetaFrame to provide 
access to applications over the web. She must select a machine to use as the 
web server in her implementation. Of the following, which three machines could 
serve as a web server in the implementation? (Choose three.) 

A. A system running Internet Information Services 4.0 on Microsoft NT Server 
4.0 
B. A system running Internet Information Services 6.0 on Microsoft Windows 
Server 2003 
C. A system running Internet Information Services 5.0 on Microsoft Windows 
Server 2000 
D. A system running WebSphere 4.0 on Solaris 9 with WebSphere Servlet Engine 
6.0 and Sun JDK1.4.0 

Answer: 

30. Which of the following is required software for Web Interface servers 
running on Windows platforms? 

A. Sun JDK 
B. Tomcat Servlet Engine
C. Microsoft .NET Framework
D. Microsoft Java Virtual Machine 

Answer: 

31. Which four ICA clients are supported in Web-enabled MetaFrame environments? 
(Choose four.)

A. Java ICA client 
B. OS/2 ICA client
C. Win32 ICA client
D. Win16 ICA client 
E. Solaris ICA client 
F. Macintosh ICA client

Answer:

32. Given an implementation of the Web Interface for MetaFrame in a UNIX 
environment that includes Solaris clients, which browser can be used? 

A. Netscape Navigator 
B. Netscape Communicator 
C. Internet Explorer 
D. Both A and B 

Answer: 

33. You are planning to migrate from Program Neighborhood to Web Interface as 
the means of displaying the user applications. The Web Interface server will be 
located behind the internal firewall.Where should you logically locate the Web 
Interface server so that the fewest number of subnets is traversed?

A. In the DMZ 
B. In any subnet 
C. In the same subnet as the MetaFrame servers 
D. In the same subnet as the smallest group of users 

Answer: 

34. You have deployed Web Interface using the default ports in a segregated 
subnet without a certificate. Your network administrator made a number of 
changes over the weekend, and now users cannot access Web Interface. Your 
network administrator asks you which port is required to support this 
deployment of Web Interface. You respond __________.

A. TCP port 80
B. TCP port 443 
C. TCP port 8080 
D. TCP port 2512 

Answer: 

35. An administrator will web-enable his MetaFrame XP for Windows servers. 
During setup of the Web Interface for MetaFrame, which two of the following 
must he specify when defining the Citrix Server settings? (Choose two.) 

A. TCP/IP port number used by IIS 
B. MetaFrame administrators credentials 
C. All servers running the Citrix XML Service 
D. MetaFrame server running the Citrix XML Service
E. TCP/IP port number used for the Citrix XML Service

Answer: 

36. During installation of the Web Interface how can you specify all the 
MetaFrame servers in a given farm? 

A. Specify the farm name 
B. Specify the subnet of all the servers 
C. Specify the server names in a comma-delimited format 
D. Specify the name of the server running the primary XML service 

Answer: 

37. An administrator has installed the Web Interface on a web server name 
"resources." During installation of the Web Interface, he specified the 
MetaFrame XP server named "HQApps" which resides in the "HQServe" farm.To which 
URL should the administrator browse in order to verify that installation was 
successful?

A. http://resources/HQApps 
B. http://HQApps/resources/Citrix 
C. http://HQApps/Citrix/MetaFrame 
D. http://resources/Citrix/MetaFrameXP 

Answer: 

38. What is the oldest version of Internet Explorer that can be used to view 
the Web Interface Admin tool? 

A. Internet Explorer 4.0 
B. Internet Explorer 5.0 
C. Internet Explorer 5.5
D. Internet Explorer 6.0

Answer: 

39. What can prevent an administrator from logging into the Web Interface Admin 
tool? (Choose two.) 

A. Attempting to access the site using HTTPS 
B. Attempting to access the Admin tool through a firewall 
C. Attempting to access the Admin tool on a server running IIS 
D. Attempting to access the Admin tool through an HTTP proxy server 

Answer: 

40. Which page in the Web Interface Admin tool allows you to configure proxy 
settings? 

A. ICA Client deployment
B. Client-side firewall settings
C. Server-side firewall settings 
D. Manage MetaFrame server farms 

Answer: 

41. Which page in the Web Interface Admin tool allows you to configure ICA 
client pass-through authentication? 

A. Authentication 
B. ICA customization 
C. ICA Client deployment 
D. Manage MetaFrame server farms 

Answer: 

42. Which port does Web Interface use to communicate with the RSA ACE Server 
when SecurID integration is enabled? 

A. TCP 80 
B. TCP 443 
C. UDP 5500 
D. UDP 1604 

Answer: 

43. What can be used to configure Program Neighborhood Agent clients to use 
authentication methods that are different from other clients in a Web Interface 
implementation? 

A. NFUSE.CONF 
B. Web Interface Admin tool 
C. Citrix Management Console
D. Program Neighborhood Agent Admin tool
E. Program Neighborhood Configuration agent 

Answer: 

44. You are using the HTTPS protocol to secure communication between the 
MetaFrame server farm and the Web Interface server. Which two must you consider 
when configuring MetaFrame servers? (Choose two.) 

A. Port 80 should be specified in the SSL Server Port field. 
B. Port 80 should be specified in the XML Service Port field. 
C. HTTPS must be specified in the Transport type section of the Settings for 
all servers. 
D. The server names listed should match the names that appear on the servers' 
certificates. 

Answer: 

45. The first server in your server list is named Enterprise1. The second 
server in your server list is named Enterprise2. The third server in your 
server list is named Enterprise3. Load balancing is enabled for your server 
farm and the bypass time for failed servers is set for 30 minutes. What happens 
if Enterprise1 fails when contacted by the Web Interface server? 

A. Enterprise2 is contacted immediately. 
B. Enterprise2 is contacted after 30 minutes. 
C. The less busy server of Enterprise2 or Enterprise 3 is contacted in 30 
minutes. 
D. The less busy server of Enterprise2 or Enterprise 3 is contacted 
immediately. 

Answer: 

46. On the Manage MetaFrame server farms page of the Web Interface Admin tool, 
administrators can assign priority to MetaFrame server farms available to the 
Web Interface. Why is it important that administrators place the server farms 
in the appropriate order? (Choose two.) 

A. Server farm fault tolerance is configured according to the order listed. 
B. Password changes are attempted by the XML service in the order listed. 
C. PN Agent clients can view applications only from the first farm on the list. 
D. Load balancing of the server farms is based upon the order of the farms 
listed. 
E. Application sets for guest users are available only from the first farm on 
the list. 

Answer: 

47. Which three ICA Java Client settings can be included when users download 
the client in a Web Interface deployment? (Choose three.) 

A. Audio
B. Encryption
C. Connection center 
D. Legacy server support 

Answer: 

48. Microsoft Excel is a load balanced application that is published in the 
Marketing and Finance farms of an organization. The administrator of the 
Marketing farm configured Excel for both .XLS and .XLA file types. The 
administrator for the Finance farm configured Excel for .XLS, .XLC, .XLM4, .TXT 
and XLA file types. What file types will the Web Interface Extension support 
for Enhanced Content Publishing? 

A. .XLA and .XLS only 
B. All file types except .TXT
C. .XLA, .XLS, and .XLC only
D. .XLC, .XLM4, and .TXT only 
E. .XLS, .XLA, .XLM4, .XLC, and .TXT 

Answer: 

49. Which three tasks must be done so that a Web Interface server can function 
in a Web Interface Extension environment? (Choose three.)

A. Web Interface Extension must be configured to work with the Web Interface. 
B. Web Interface must be configured to run in an Web Interface Extension mode. 
C. The IP address of the Web Interface server must be specified during setup of 
Web Interface Extension. 
D. The address for the Web Interface Extension server must be specified in the 
Web Interface server list in the Admin tool. 
E. The communication port number for the Web Interface Extension server should 
be specified in the Citrix MetaFrame Servers page of the Web Interface Admin 
tool.

Answer: 

50. What information must be provided in the URL field of the "Farms>Detail for 
one farm" page to add a farm to the Web Interface Extension environment? 
(Choose two.) 

A. Domain name 
B. IP address of the Web Interface server 
C. Address of the primary server running the Citrix XML Service 
D. Port number of the primary server running the Citrix XML Service 

Answer: 

51. In a Web Interface Extension deployment, what must be done to ensure user 
access to resources in multiple MetaFrame server farms? (Choose two.)

A. Specify a group's home farm
B. Set Presentation Tier Identities 
C. Define User Credential Mapping 
D. Add Farms to Web Interface Extension 

Answer: 

52. When using TLS to secure communication between the Web Interface Extension 
server and the MetaFrame server farm, where is the root security certificate 
stored? 

A. In the Web Interface Extension keystore 
B. In the Web Interface Extension database 
C. In the Web Interface Extension wwwroot folder
D. In the Web Interface Extension registry settings

Answer: 

53. Where are user preferences stored in a Web Interface deployment? 

A. User preferences are stored in cookies located on the client. 
B. User preferences are stored in the NFUSE.PROPERTIES file. 
C. User preferences are stored in the datastore on the server farm. 
D. User preferences are stored in the session log on the MetaFrame server. 

Answer: 

54. The administrator for the company's server farm did not enable 
personalization at the ICA Customization page of the Web Interface Admin tool. 
Which statement is true?

A. The default settings for the Web Interface applications cannot be changed. 
B. The settings for published applications cannot be changed by users through 
Program Neighborhood. 
C. The settings for published applications configured at the Citrix Management 
Console will be used for applications. 
D. The default settings for Web Interface will be used until the user specifies 
settings in the Web Interface settings page. 

Answer: 

55. The address of which of the following components is translated in a 
deployment of the Web Interface that requires address translation to be 
implemented on the server-side firewall? 

A. Internal clients 
B. External clients
C. Web Interface server
D. Secure Ticket Authority 
E. MetaFrame Presentation Server 

Answer: 

56. Which two of the following values in the AddressResolutionType parameter in 
the NFUSE.CONF indicate that MetaFrame addresses are returned as IP addresses? 
(Choose two.)

A. ipv 
B. dns 
C. ipv4 
D. dns-port 
E. ipv4-port 

Answer:

57. The Web Interface default configuration is set for Network Address 
Translation and alternate addressing has been enabled for the MetaFrame 
servers. However, policy requires that internal users on the same subnet as the 
MetaFrame servers obtain access to the server resources by using an internal 
private address. How can an administrator permit the internal users access to 
resources through a private IP address while maintaining the default settings? 

A. He specifies normal addressing for the internal clients located on the same 
subnet in the Specific Address Translation settings. 
B. He types normal address in the ServerAddressMap parameter of the NFUSE.CONF 
file. Then he saves the file and restarts the IIS server. 
C. He specifies the MetaFrame server's address and port number in the MetaFrame 
server address section of the Server-Side Firewall settings page. 
D. He types the address in the Session.Field.NFuse_CitrixServer parameter of 
the NFUSE.CONF file. Then he saves the file and restarts the IIS server.

Answer:  

58. Which statement is true for the Port Address Translation feature in a Web 
Interface for MetaFrame deployment? 

A. This feature functions only if the MetaFrame servers are configured for Port 
Address Translation. 
B. This feature requires that the client provide the server port information to 
the Web Interface web server. 
C. This feature allows traffic to be routed to multiple MetaFrame servers 
through a single public IP address.
D. This feature requires that the firewall be configured for unique external IP 
address for MetaFrame servers.

Answer:  

59. Which two Server-side Firewall options allows administrators to map 
internal MetaFrame servers through a single external IPaddress in a Web 
Interface implementation? (Choose two.) 

A. Secure Gateway 
B. Normal addressing 
C. Port address translation 
D. DNS address resolution E. Network address translation 

Answer: 

60. Scenario: While configuring the server-side firewall settings for an Web 
Interface implementation, an administrator selects the alternate address option 
for clients in the prefix 162.22 . The MetaFrame server with the 10.91.1.2 is 
mapped to the 188.21.2.3 IP address. The default address translation setting 
selected is "Normal address." Which of the following best depicts the outcome 
of this configuration?

A. All traffic will be routed to the 188.21.2.3. address.
B. All traffic from the 166.22 will be routed to the 188.21.2.3 address. 
C. Only traffic from the 166.22 subnet will be routed to the 10.91.1.2 address. 
D. Traffic from the 166.22 subnet will be translated and then routed to the 
188.21.2.3 address. 

Answer: 

61. On the Server-side Firewall Settings page of the Web Interface Admin tool, 
which of the following options allows for server addresses to be mapped to 
public IP addresses and ports? 

A. Normal address 
B. DNS address resolution 
C. Translated address
D. Both A and C

Answer: 

62. An organization's implementation of the Web Interface has network 
addressing enabled at the firewall and alternate addressing configured as the 
default setting. How can an administrator specify that the actual IP address 
for the MetaFrame servers be included for internal clients with the 22.2 
prefix? (Choose two.)

A. Specify "Normal address" in the specific address translation settings. 
B. Specify "Alternate address" in the specific address translation settings. 
C. Specify "Translated address" in the specific address translated settings. 
D. Enter the prefix 22.2 in the client address prefix and click Add to add it 
to the Setting map list. 
E. Enter the prefix 22.2 in the translated address field of the MetaFrame 
server address translation map. 

Answer: 

63. While configuring address translation options for a Web Interface 
implementation a MetaFrame administrator selects the Alternate address option 
in the default server-side firewall settings. What additional step must he take 
to ensure that the server IP address will be translated at the firewall? 
(Choose two.) 

A. Enable network address translation at the firewall. 
B. Specify the actual IP address of the servers in Setting map. 
C. Use the ALTADDR command to configure the MetaFrame servers. 
D. Specify translated IP address in the MetaFrame server address translation 
map section. 

Answer: 

64. Which addressing option provides the private IP address of the MetaFrame 
server to clients in a Web Interface implementation? 

A. Port address translation
B. Normal address translation
C. Network address translation 
D. Alternate address translation 

Answer: 

65. Which three of the following must be provided on the Server-Side Firewall 
Settings page when using Secure Gateway with the Web Interface? (Choose three.)

A. The client address prefix
B. The name of the Secure Gateway server 
C. The URL for the Secure Ticketing Authority 
D. The Translated port number for the Secure Gateway
E. The communication port number for Secure Gateway
F. The translated address of the Secure Gateway server 

Answer: 

66. The Web Interface is deployed to users with access to three MetaFrame XP 
Servers. The servers and the internal users are on the same subnet inside the 
firewall. External users will connect to the Web Interface server using a 
public IP address. Which three of the following must be specified to allow Port 
Address Translation? (Choose three.) 

A. MetaFrame server IMA port address 
B. MetaFrame server normal IP address 
C. MetaFrame server translated IP address 
D. MetaFrame server translated port address 
E. Web Interface server translated port address 

Answer: 

67. The STA server has the IP address 10.9.12.44 and is secured with an SSL 
certificate for "sta.acme.com." Which of the following STA URLs should be 
entered into the Web Interface Admin Tool in order to secure the traffic 
between Web Interface and the STA?

A. https://10.9.12.44/Scripts/CtxSta.dll 
B. http://sta.acme.com/Scripts/CtxSta.dll 
C. http://10.9.12.44:443/Scripts/CtxSta.dll 
D. https://sta.acme.com/Scripts/CtxSta.dll 

Answer: 

68. What is the default port number used by the SOCKS proxy server in a Web 
Interface implementation? 

A. 443 
B. 1001 
C. 1080 
D. 8080 

Answer: 

69. In the Web Interface Admin Tool, what type of proxy server is assumed when 
you select "Use explicit mapping" on the Client-side Firewall page? 

A. ICA 
B. SSL 
C. HTTP 
D. SOCKS

Answer: 

70. In which two modes can the Secure Gateway be installed? (Choose two.) 

A. Proxy 
B. Manual 
C. Typical 
D. Normal 
E. Remote 

Answer: 

71. What are the two main categories of Ciphersuites supported by Secure 
Gateway? (Choose two.) 

A. SSL
B. RSA
C. DES 
D. GOV 
E. COM 

Answer: 

72. Which DLL file produces and validates Secure Gateway tickets?

A. WPNBR.DLL 
B. CTXSTA.DLL 
C. STACTX.DLL 
D. CSGSTA.DLL
E. CTXCSG.DLL

Answer:  

73. When deploying Web Interface using Secure Gateway to secure ICA traffic, 
the Web Interface server connects to which of the following? (Choose two.) 

A. The Citrix XML Service 
B. The Secure Gateway server 
C. The least-busy MetaFrame server 
D. The Secure Ticket Authority server 

Answer: 

74. In an implementation of the Web Interface that includes Secure Gateway, 
what happens when a user clicks on a published application link? 

A. The Web Interface sends the URL for the requested MetaFrame server to the 
Secure Ticket Authority. 
B. The Web Interface sends the IP address for the requested MetaFrame server to 
the Secure Ticket Authority. 
C. The Web Interface sends the NDS location for the requested MetaFrame server 
to the Secure Ticket Authority. 
D. The Web Interface sends the domain name for the requested MetaFrame server 
to the Secure Ticket Authority. 

Answer: 

75. When launching a published application through Web Interface and Secure 
Gateway, which of the following events occurs first? 

A. The XML service locates the least-busy server. 
B. The client connects to the Secure Gateway server. 
C. The Secure Gateway ticket is sent to the STA for validation.
D. Web Interface requests a Secure Gateway ticket from the STA.

Answer: 

76. You have just installed Secure Gateway to work with your Web Interface 
implementation. During the installation of your server certificate you need to 
select an account type that the snap-in will manage. What should you select? 

A. Service
B. Administrator 
C. Local Computer 
D. My user account 

Answer: 

77. Which of the following actions requires a root certificate on the Web 
Interface server?

A. Configuring port address translation 
B. Configuring for Secure Gateway integration 
C. Implementing SSL Relay to secure ICA client and MetaFrame connections 
D. Implementing SSL Relay to secure Web Interface and MetaFrame XML service 
communication 

Answer: 

78. Which of the following files must be used to install the Secure Ticket 
Authority? 

A. sta_csg.msi 
B. csg_sta.msi 
C. sta_ctxs.msi 
D. csg_gwy.msi 

Answer: 

79. What is the default Secure Ticketing Authority TCP port number? 

A. 80 
B. 443 
C. 1494 
D. 8080 

Answer: 

80. Which two of the following are configured in the connection parameters 
window when using the Advanced option in the Secure Gateway Installation 
Wizard? (Choose two.) 

A. Specify connection limits
B. Specify unique device log
C. Specify server IP address 
D. Specify connection timeout 

Answer: 

81. Which two options are configured in the secure protocol parameters window 
when using the Advanced option in the Secure Gateway Installation Wizard? 
(Choose two.) 

A. Select cipher suite 
B. Select port number 
C. Select cipher name 
D. Select server protocol 
E. Select secure protocol

Answer: 

82. What does an ICA client device need in order to make a connection to the 
Secure Gateway server? 

A. Root certificate 
B. ICA Client certificate 
C. Java Runtime Environment 
D. Internet Information Server 5.0 

Answer: 

83. Which two statements are true about Secure Gateway? (Choose two.) 

A. You must always load balance the STA servers.
B. TCP/IP Keep alive messages from the Secure Gateway server are sent only to 
the ICA client.
C. The Secure Gateway server does not transmit Keepalive messages to the 
MetaFrame server. 
D. ICA KeepAlive messages from the MetaFrame server to the ICA client are not 
intercepted by the Secure Gateway server. 

Answer: 

84. Of the following servers, which two can be debugged using the Citrix Web 
server Debugging tool? (Choose two.) 

A. Web Interface servers
B. Secure Gateway servers 
C. Secure Ticketing Authority servers 
D. MetaFrame XP Presentation servers 

Answer: 

85. Which data does the Citrix Web Server Debugging and Analysis tool 
enumerate? (Choose four.)

A. All STA settings 
B. ASP session objects and variables 
C. All web sites and their root directories 
D. Configuration details of Web Interface 
E. List of users currently logged into the server 
F. Web browser cookies for all web sites stored in cache 

Answer:

86. To use Citrix Web Server Debugging and Analysis tool with the Web Interface 
2.0, the DEBUG.ASP file must be copied to the web server. Where should the 
copied file be placed? 

A. Into the System32 directory
B. Onto the desktop of the web server
C. Into the /Citrix/MetaFrameXP/site folder 
D. Into the Programs Files/Citrix/NFuse folder 

Answer: 

87. Which of the following statements is true? 

A. Any authorized user of the web server can use the Citrix Web Server 
Debugging and Analysis tool.
B. The Citrix Web Server Debugging and Analysis tool can be used to 
troubleshoot Apache web servers.
C. Any known problems discovered while using the Citrix Web Server Debugging 
and Analysis tool will be displayed in black text. 
D. The Citrix Web Server Debugging and Analysis tool can be used to identify 
when a site's document root disagrees with the NFUSE.CONF settings.

Answer

88. For the text entry prediction zero-latency feature of the ICA client to be 
activated, the line ZLKeyboardMode=1 must be present in the ICA file delivered 
to the client device. To which text file on the Web Interface server would you 
add this line in order to enable text entry prediction for all users? 

A. LAUNCH.ICA 
B. NFUSE.CONF 
C. TEMPLATE.ICA 
D. CTXSTA.CONFIG 

Answer: 

89. On a Web Interface for UNIX server, which of the following NFUSE.CONF 
parameters would enable Secure Gateway connectivity for Internet users but NOT 
for local LAN users on the 10.100.0.0/255.255.0.0 subnet? 

A. AlternateAddress=Off 
B. BypassCSGAddress=10.100.*.* 
C. ClientAddressMap=10.100,Normal,*,CSG 
D. SessionField.NFuse_CSG_AddressTranslation=None 

Answer: 

90. For which three of the following web browser technologies is support 
required for normal operation of Web Interface 2.0? (Choose three.) 

A. Java 
B. Cookies
C. JavaScript
D. HTML forms 

Answer: 

91. Which of the following Web Interface features will malfunction if all 
MetaFrame servers in the farm are NOT running the XML service on the same port? 

A. Ticketing
B. Java client 
C. Application enumeration 
D. Changing expired passwords 

Answer: 

92. Which text file would you edit to enable logging of activity at the Secure 
Ticket Authority server?

A. DEBUG.ASP 
B. CONFIG.TXT 
C. NFUSE.CONF 
D. CTXSTA.CONFIG 

Answer: 

93. During normal operation of Web Interface and Secure Gateway, how often does 
Web Interface request a ticket from the Secure Ticket Authority? 

A. Each time the application list is refreshed 
B. Each time a user logs in to Web Interface 
C. Each time a user clicks an application icon 
D. Each time a user connects to the Secure Gateway

Answer: 
1. You start the Resource Manager Watcher Window but only a blank window 
appears.Why is this so? 

A. No connection to the DataStore 
B. No connection to the DataCollector 
C. You have used a wrong version of the MDAC 
D. Farm Metric Monitor 
E. None of the listed 
F. No red or yellow alarms have been detected 

Answer: 


2. From which of the following tools can you have an overview of the status per 
server being      monitored? 

A. CMC 
B. MMC 
C. Citrix Server Administration 
D. Resource Manager Watcher Window 
E. Resource Manager Administration 

Answer: 

3. Which of the following is not a valid metric on a Windows 2000 server with 
Resource Manager installed?
 
A. Network Segment 
B. Memory 
C. Logical disk 
D. Network Interface 
E. System 

Answer:  

4.  The Citrix management Console is installed by default on NT 4.0 Server, 
Terminal Server Edition. 

A. False 
B. True 

Answer: 


5.The Resource Manager is storing its configurations and settings in the Data 
Collector. 

A. False 
B. True 

Answer: 


6.A Metric is changing to Yellow alarm when a defined value for a metric has 
been over the yellow limit for a period of how much time? 

A. 60 seconds 
B. 90 seconds 
C. 45 seconds 
D. 15 seconds 
E. 30 seconds 

Answer: 


7.What Service is stopped during the Resource Manager installation and then 
started again? 

A. Installer Service 
B. XML Service 
C. ICA Service 
D. IIS Admin Service 
E. IMA Service 

Answer: 


8.How to install the Resource Manager? 

A. Install from the System Monitoring and Analysis CD 
B. Install from the Management CD 
C. Install from the Resource Manager CD 
D. Install MetaFrame XPe and when the license is activated then you can use RM 
E. None of the listed 

Answer: 

9. The first server with Resource Manager is automatically selected as the Farm 
Metric 
Server. Can this server also be the backup Farm Metric Server? 

A. No 
B. Yes 

Answer: 

10. Citrix Load Management is a required component in the server farm before 
installing Resource Manager. 

A. False 
B. True 

Answer: 


11. A Metric can have different color status that each indicates the current 
status. What does Red indicate? 

A. Snooze 
B. Normal operation 
C. Problem 
D. Not configured 
E. Warning 
F. Sleep

Answer: 


12. From which of the following tools can you have an overview of the total 
metrics per server being monitored? 

A. CMC 
B. Citrix Server Administration 
C. Resource Manager Watcher Window 
D. Resource Manager Administration 
E. MMC 

Answer: 

13. A Metric can have different color status that each indicates the current 
status. Which color indicates no monitoring because it is set to snooze? 

A. Blue 
B. Red 
C. Yellow 
D. gray 
E. Green 
F. Black 

Answer:  


14. The Citrix Management Console is a Java application and therefore a Java 
Runtime Environment (JRE) is required. What will happen during the installation 
of the CMC if the JRE it not already installed? 

A. The setup stops 
B. The setup tells you to install JRE before continuing 
C. The JRE will be installed 
D. None of the listed 
E. The setup continues but the CMC will not start until you have installed JRE 

Answer: 


15.It is required that each TAPI Server has an e-mail client installed. 

A. True 
B. False 

Answer: 


16. Application metrics is by default enabled on a Resource Manager server? 

A. True 
B. False 

Answer:  


17. How to install the Resource Manager Mail Service? 

A. Is done when you install the MAPI Connection Server 
B. After installing Resource Manger type 'register RMMS /add' 
C. Is done when you install the TAPI Server 
D. Is done automatically when you install Resource Manager 
E. Before installing Resource Manager type 'register RMMS /add' 

Answer:  


18. A Metric can have different color status that each indicates the current 
status. Which 
color indicates that the thresholds have not yet been configured? 

A. Black 
B. Red 
C. Yellow 
D. gray 
E. Green 
F. Blue 

Answer:  


19. What is the name of the monitor window that displays any red or yellow 
alarm in the 
farm? 

A. Resource Manger Monitor 
B. Resource Manager Watcher Window 
C. None of the listed 
D. Farm Metric Monitor 
E. Resource Manger Overview 

Answer: 


20. Which server in your farm is by default selected as the backup Farm Metric 
Server? 

A. The last server with Resource Manager installed 
B. The second server with Resource Manager installed 
C. The first server with Resource Manager installed 
D. The DataStore 
E. Must be done manually 
F. The DataCollector 

Answer: 


21. On a Windows 2000 server which of the following default metrics will show 
info about 
the number of threads? 

A. Bytes Total/sec 
B. % Usage 
C. Context Switches/sec 
D. Available Bytes 
E. Active Sessions 
F. % Interrupt time 

Answer: 


22. What type of template is used to create the reports? 

A. ASP 
B. CSV 
C. ICA 
D. IMA 
E. HTML 

Answer: 


23. Citrix IMA is short for? 

A. None of the listed 
B. ICA Multiple Administration 
C. Installer of Multiple Applications 
D. Installation Management Administration 
E. Independent Management Architecture 

Answer:  


24. When using the Citrix Management Console, what is the only supported 
protocol? 

A. IPX 
B. None of the listed 
C. NetBeui 
D. TCP/IP 
E. SPX 
F. ICA 

Answer: 


25. You have a server farm with 100 MetaFrame XPe servers in 2 Zones all with 
Resource 
Manager installed. How many Farm Metric Servers exist by default in the farm? 

A. Two, one per Zone 
B. One 
C. None  

Answer: 


26. The Resource Manager is a subsystem of which of the following? 

A. IMA Service 
B. Data Collector 
C. ICA protocol 
D. XML Service 

Answer:  


27. The MDAC is a collection of components that provide ODBC core functionali y 
and 
ODBC drivers. 

A. True 
B. False 

Answer:  


28.  What is the 'MAPI Connection Server' when an alert is sent by e-mail to 
the 
Administrator? 

A. A private POP3 server 
B. None of the listed 
C. An e-mail client 
D. A public POP3 server 
E. An e-mail server 

Answer:  



29. Citrix Resource Manager is included in which of the following products? 

A. Citrix MetaFrame XPe  
B. Citrix MetaFrame XPs 
C. An Add-On products to any MetaFrame XP server 
D. None of the listed 
E. Citrix MetaFrame XPa 

Answer: 


30. A Metric can have different color status that each indicates the current 
status. Which 
color indicates a warning condition? 

A. Green 
B. Blue 
C. Red 
D. gray 
E. Yellow 
F. Black 

Answer:  


31. On a Windows 2000 server which of the following default metrics will show 
info about 
memory being used? 

A. Available Bytes 
B. Context Switches/sec 
C. Active Sessions 
D. % Interrupt time 
E. Bytes Total/sec 
F. % Usage 

Answer: 


32. Is it possible to monitor applications on a MetaFrame 1.8 server with 
Resource Management Services 1.0b installed from the CMC? 

A. No 
B. Yes 

Answer:  


33. What additional service on a NT 4.0, TSE server must be installed to send 
SNMP alerts? 

A. Citrix Alert Service 
B. SNMP Service 
C. Citrix XML Service 
D. Resource Manager SNMP Service 
E. Citrix SNMP Service 

Answer: 


34. A Metric is a combination of which of the following? (Select all that 
apply) 

A. Instance 
B. System 
C. Disk 
D. Counter 
E. Object 
F. License 

Answer: 



35. How often is the RMLocalDatabase compacted on every server? 

A. Once every weekend 
B. Once every time the IMA service is started 
C. Once every 500 writes 
D. Once every hour 
E. Once a day 

Answer:  


36. When using SMS to send alerts to the Administrator how many TAPI servers 
are required? 

A. Two per farm (one + one backup) 
B. None of the listed 
C. Two per Zone (one + one backup) 
D. One per farm 
E. One per Zone 

Answer:  


37. The local Resource Manager database is a local cache of the Farm Metric 
Server? 

A. True 
B. False 

Answer:  


38. On a Windows 2000 server which of the following default metrics will show 
info about a busy server responding to input and output rather than user 
processing? 

A. % Interrupt time 
B. % Usage 
C. Bytes Total/sec 
D. Active Sessions 
E. Available Bytes 
F. Context Switches/sec 

Answer:  


39. The mail profile you have created on your MAPI Connection Server must be 
configured the same way on all your MAPI Connection Servers? 

A. False 
B. True 

Answer:  

40. Is it possible to use the Local Host cache as the Resource Manager 
database? 

A. Yes 
B. No 

Answer: 


41. How to install the Resource Manager Mail Service on a MetaFrame server? 

A. Is done from the CMC 
B. Is done automatically when RM is installed 
C. Start the RM_Mail after RM is installed but nor configured 
D. Start the RM_Mail before installing RM 
E. None of the listed 

Answer: 


42. The System Snapshot report will show the status of your server farm within 
the last 48 hours? 

A. No, only one server at a time 
B. No, only one Zone at a time 
C. No, only within the last 24 hours 
D. Yes 

Answer:  



1.How many Packager systems are required in a farm with 100 servers in 2 Zones 
and you are only   deploying MSI packages? 

A. None 
B. Two per zone  
C. Two per farm 
D. One per zone  
E. One per farm 

answer: 

2.To avoid the problem with an ADF recording that cannot always detect the 
intent of the   installation program when the registry has been  changed you 
can select to 'Add unattended   program' option. 

A. False  
B. True 

Answer: 

3.The installation script in the ADF file contains a statement called CopyFile. 
The   Overwrite-flag can be which of the following?  

A. Newer 
B. TimeStamp  
C. Always 
D. Never  
E. Older 
F. Write  

Answer:  

4.Is it possible for the Packager to build a package that also will modify the 
Registry on the   target servers?  

A. Yes 
B. No  

answer: 

5.The Citrix Packager requires a Windows 2000 Server with Terminal Services in 
Administration   Mode.  

A. False 
B. True  

Answer:  

6.What is the next step when you have created a package with Acrobat Reader and 
now want to   create a package with WinZip?  

A. Uninstall Acrobat Reader and then create a new project with WinZip 
B. None of the listed 
C. Create a new WinZip project  
D. Perform a Rollback from the Packager 
E. Reinstall your Packager machine from you Image  
F. Reinstall your Packager machine from scratch 

Answer: 

7.Where should you place an MSI package? 

A. Root on Packager system 
B. Network sharepoint 
C. None of the listed  
D. Root on Data Collector 
E. Anywhere on the Packager system  
F. On a CD or DVD 

Answer: 

8.What is MSI short for? 

A. Microsoft Installer  
B. Multiple System Integration 
C. None of the listed  
D. Microsoft System Integration 
E. More System Information  

Answer: 

9.During a recording when making a new ADF package all information is stored in 
a recorder log   file. What is this log file then used  for?

A. To create the MSI file  
B. To copy the necessary application files 
C. To create the ADF file  
D. A temporary file 
E. Is used on all target server when deploying the package  
F. As a log file that can be viewed later 

Answer: 

10.The correct order for upgrading from IMS 1.0b to IM is: 

1. Run the IM_APP_Upgrd migration utility  
2. Install Installation Manager 
3. Install MetaFrame XPe  

A. True 
B. False  

Answer:  

11.Citrix IMA is short for? 

A. ICA Multiple Administration  
B. Independent Management Architecture 
C. Installation Manager Administration  
D. None of the listed 
E. Installation Management Architecture  

Answer:  

12.If you are going to install the Installation Manager on a Windows NT server 
4.0, Terminal    Server Edition - what is the required SP level?  

A. Service Pack 6 
B. None of the listed  
C. Service Pack 4 
D. Service Pack 5  

Answer: 

13.Citrix Installation Manager is included in which of the following products? 

A. Citrix MetaFrame XPa  
B. Citrix MetaFrame XPs 
C. An Add-On products to any MetaFrame XP server  
D. None of the listed 
E. Citrix MetaFrame XPe  

Answer: 

14.How is it possible for the ICA client to see a difference between 
applications published via    the Installation Manager and applications  
published manually? 

A. None of the listed  
B. By the extra logon 
C. By the icon of the application  
D. They can't 
E. By the name of the application  

Answer:  

15.In the [Config-Action] section of the ADF is a RemoveService parameter that 
controls the name    of a service to be removed. Will it both stop  and remove 
this service? 

A. No  
B. Yes 

Answer: 

16.Is it possible to uninstall applications via Installation Manager IM when 
these applications    where deployed with Installation Management Services IMS? 

A. Yes  
B. No 

Answer: 

17.When you select to schedule an installation of an ADF package and select the 
default time,    when will the ADF package then be installed?  

A. Right now 
B. Within one hour  
C. Within the next night 
D. When no users are connected  
E. Within one day 

Answer: 

18.Which of the following is correct when your environment contains both W2K 
Servers and NT 4.0    Terminal Server Edition? 

A. Package each of the applications on the W2K platform with the /multi  
B. None of the listed 
C. Package all applications on the W2K platform and then edit the  ADF file to 
cover both OS 
D. Package each of the applications for each OS  

ANSWER: 

19.The Citrix Management Console is a Java application and therefore a Java 
Runtime Environment    is required on all Citrix XP servers in  the farm. 

A. False  
B. True 

Answer:

20.At what default location is a new Project saved? 

A. \Program Files\Citrix  
B. \Program Files\Citrix\Projects 
C. \Program Files\Citrix\Packager\Projects  
D. \Program Files\Citrix\IM\Packager\Projects 
E. None of the listed  

Answer:  

21.If you check the EventLog for MSI packages errors, under which source are 
they listed?  

A. Gemini Installer 
B. MSIInstaller  
C. Installation Manager 
D. None of the listed  
E. Citrix Installer 
F. Installer Service  

Answer: 

22.The Citrix Installation Manager plug-in is adding which of the following to 
the CMC?  

A. Installation Manager node 
B. Applications node  
C. Packager node 
D. None of the listed  
E. Scheduler node 

Answer: 

23.When performing a Rollback and you have created multiple packages, this must 
be done in the    same order as the packages were created.  

A. True 
B. False  

Answer: 

24.What is the 'Root Build Location' in the packager? 

A. Subst to C:  
B. No such thing 
C. The temp directory used when creating a package  
D. The network sharepoint 
E. The location of the Installation Manager database  

Answer:  

25.Some Application Compatibility Scripts have Special Instructions - how do 
you find these    Special Instructions?  

A. Select Tools\Information in the Packager 
B. You have to know before you start to package the application 
C. Select Help\Instructions in the Packager  
D. None of the listed 
E. Check the Properties in the CMC\Installation Manager  
F. If you select a Application Compatibility Script that have these Special 
Instructions then       they will show up in the Special Instructions  section 

Answer: 

26.Where is the shortcut to the Installation Manager located by default? 

A. Start/Programs/Citrix/Citrix Management Console  
B. Start/Programs/Citrix Installation Manager 
C. None of the listed  
D. Start/Programs/Citrix/Citrix Installation Manager 

Answer: 

27.An ADF file is what kind of file type? 

A. Reg file  
B. ASP file 
C. Text file   
D. Htm file 
E. HTML file  

Answer:  

28.Where on the Application Packaging and Delivery CD is the Im_App_Upgrd 
utility located?  

A. Support\im\i386 
B. support\debug\i386  
C. IM\Support\i386 D. Support\i386\debug  
E. None of the listed 
F. Support\i386  

Answer:  

29.Installation Manager can be used to deploy ADF and MSI packages. But can it 
also be used to    install MetaFrame XP on target servers?  

A. Yes B. No  

Answer:  

30.Which Installation Management component is responsible for maintaining a 
database of MSI    packages?  

A. None of the listed 
B. Citrix Installation Manager Plug-In  
C. IMA 
D. Citrix Management Console  
E. Citrix Installer Service 

Answer: 

31.Citrix Installation Management consists of which three components? 

A. Citrix Installer Service  B. Citrix Packager 
C. ADF files  
D. Citrix Installation Manager Plug-In 
E. Citrix Management Console  
F. Microsoft Installer Service 

Answer:  

32.Is it possible to use packages created with Installation Management on an 
Installation    Management Services system? 
A. Yes 
B. No  

Answer:  

33.Which Installation Management component is used to create ADF packages? 

A. Citrix Management Console  
B. MS Installer Service 
C. IMA  
D. Citrix Installer Service 
E. None of the listed  
F. Citrix Packager 

Answer: 

34.How many Packager systems are required in a farm with 100 servers in 2 Zones 
and you are only     deploying ADF packages?  

A. Two per zone 
B. One per farm  
C. None 
D. Two per farm  
E. One per zone 

Answer: 

35.If your Citrix servers in the farm use different protocol stacks then it is 
only    possible to deploy packages to one protocol.  

A. False 
B. True  

Answer:  

36.The Installation Manager can deploy packages to which of the following? 

A. MetaFrame 1.8  
B. MetaFrame XP 
C. WinFrame 1.8  
D. None of the listed 
E. MetaFrame 1.0  

Answer:  

37.It is NOT possible to deploy Internet Information Server IIS via 
Installation Manager.  

A. True 
B. False  

Answer: 

38.What must you do before an ADF Package is visible in the Packages node in 
the Citrix Management Console? (select two)

A. From Packages node, click Add Package 
B. Only visible in the Packager application  
C. When building the Package click to 'Add packages to Installation Manager 
database'  
D. From the Packager application select: Tools, Add package 
E. From Installation Manager node, click Add Package  

Answer: 

39.When making a Package which of the following is recorded? 

A. Shortcuts  
B. Registry keys 
C. Files - copying  
D. PDF files 
E. Files - version  
F. INI files 

Answer: 

40.Which types of packages does the Installation Manager support? 

A. AEP  
B. ADF 
C. WFS  
D. PDF 
E. TXT  
F. MSI 

Answer: 

41.Where in the Registry on the Packager system is the installation settings 
stored? (Select two  
A. HKLM/Software/Citrix/Packager 
B. HKLM/Software/Citrix/Appcloning/Agent/Installer  
C. HKLM/Software/Citrix/Appcloning/Packager 
D. HKLM/Software/Citrix/IM/2.0  
E. HKLM/Software/Citrix/Appcloning/Installer 
F. HKLM/Software/Citrix/IMS/2.0  

Answer:   

42.What is the CD with the Installation Manager called? 

A. Citrix Installation Manager  
B. On the same CD as the MetaFrame XPe 
C. Citrix MetaFrame XPe ADD-on  
D. Application Packaging & Delivery 
E. Citrix Installation Manager 2.0  
F. None of the listed 

Answer: 

43.When an application is installed via Installation Manager, you have to 
manually publish the    application.  

A. False 
B. True 

Answer:  

44.Which service is responsible for installing the ADF package on the target 
servers?  
A. Citrix Installer Service 
B. XML Service  
C. Microsoft Installer Service 
D. None of the listed  E. IMA Service 

Answer:

45.It is recommended to install MetaFrame XPe and activate the license before   
 installing the Installation Manager.  

A. True 
B. False  

Answer:  

45.If an administrator has the necessary credentials then it is possible to run 
the Citrix       Management Console from a Windows 2000 Professional.  

A. True 
B. False  

Answer:  

46.You are using the Packager to make a package that requires a reboot. How can 
this be done?  

A. Delay the reboot as the last step in the recording 
B. None of the listed  
C. Reboot the Citrix servers manually after the package have been installed  
D. Delay the reboot and stop the recording 
E. Insert in the ADF file: ReqBoot_W2K =yes  

Answer: 

47.It is possible to deploy MetaFrame XP via Installation Manager to new 
servers.  

A. False 
B. True  

Answer: 

48.You want to deploy an MSI package from the Citrix Management Console and you 
choose the    default settings. When will this MSI package be  deployed? 

A. When no more users are connected  
B. At midnight 
C. When the Load level is 10% or less  
D. Right now 
E. None of the listed  

Answer: 

49.When making a package for both Windows 2000 and NT 4.0 Terminal Server, two 
different packages    must be created. 

A. False  
B. True  

Answer:  

50.What access privileges is need to the network sharepoint where you have you 
MSI packages for all Citrix servers (target servers?)  

A. Read/Execute 
B. Special  
C. Read 
D. Read/write  
E. Full access 

Answer: 

51.Which Installation Manager component is using the ADF file to recreate the 
installation to    target servers?  

A. Citrix Installer Service 
B. None of the listed  
C. Citrix Packager Service 
D. Published Application Manager  
E. MS Installer Service 
F. Citrix Management Console  

Answer: 

52.The Installation Manager subsystem is automatically installed when you 
install the Citrix    Installer Service.  

A. True 
B. False  

Answer: 

53.It is required to install MetaFrame XPe and activate the license before 
installing the    Installation Manager.  

A. False 
B. True  

Answer: 

54.A MetaFrame XPe version is required on the target system. 

A. False  
B. True 

Answer: 

55.What rights are necessary to run Installation Manager? (select two)

A. MetaFrame administrator  
B. Domain Administrator 
C. IM Administrator  
D. Installation Manager Administrator 
E. Member of the IM_Admin group  

Answer:   

56.Which of the following utility is used to monitor application installation 
routines?  

A. Citrix Installation Manager Plug-In 
B. MMC C. Citrix Packager  
D. CMC 
E. Citrix Installer Service  

Answer:  

57.Citrix Installation Manager is included in both MetaFrame XPa and XPe. 

A. False 
B. True  

Answer:  

58.How is it possible to modify an existing Installation Manager job? 

A. None of the listed  
B. From the Citrix Server Administration, select Tools, Modify 
C. From the Packager, select the Package and click Modify  
D. Delete the job and create a new one 
E. Select the job in the CMC and right click, select Edit job  

Answer:  

59.Smaller Server Group sizes are recommended for packages that require a 
reboot.  

A. False 
B. True  

Answer:  

60.How is an application suite packaged compared to a single application? 
A. The same way  
B. Each single application separately 
C. None of the listed  
D. With the -multi 
E. Not possible to package an application suite  

Answer:  

61.Which utility is used to monitor application installation routines? 

A. Citrix Installer Service  
B. MS Installer Service 
C. Citrix Packager  
D. Citrix Resource Manager 
E. Citrix Network Monitor  
F. None of the listed 

Answer: 

62.It is possible to control how the Installer will overwrite existing files on 
a target server.  
A. True 
B. False  

Answer:  

63.How do you remove the Packager on a NT 4.0 Server, Terminal Server Edition? 

A. Remove from the Control Panel\AddRemove Programs 
B. Stop the IMA service, remove the CMC and then remove the packager from the 
AddRemove Programs C. Select the RollBack  
D. Not possible, you have to reinstall the server E. Stop the IMA service and 
then remove from    the Control Panel\AddRemove Programs

Answer: 

64.What is the easiest step to rename a Server Group? 

A. Delete Server Group and recreate with the new name  
B. Not possible to rename a Server Group 
C. None of the listed  
D. Right click the server group and select Rename Group 
E. From a command prompt type: DSMaint -d oldname newname  

Answer:  

65.When you schedule a package to be installed, it is also possible to force 
users to logoff    before installing the package.  

A. True 
B. False  

Answer:  

66.It is possible to control how the Installer will overwrite existing files on 
a target server      Via a statement in the ADF file.  

A. True 
B. False  

Answer:  

67.Is it possible to delete a Server Group that still contains Citrix servers?  

A. Yes 
B. No  

Answer:  

68.When you schedule a package to be installed, it is also possible to wait 
with a server reboot    until all users are logged off.  

A. True 
B. False  

Answer: 

69.You create a new Project from within the Citrix Packager. 

A. True  
B. False 

Answer: 

70.MSI package errors are listed in the EventLog under the Installer Service 
source.  

A. True 
B. False  

Answer: 

71.During the installation of the Installation Manager you can choose between 
which of    the following components?  

A. MMC Plug-In 
B. Network Monitor  
C. MSI service 
D. Installation Manager Plug-In  
E. Packager 
F. Installer service  

Answer:  

72.Which tool are used to create Installation Manager Server Groups? 

A. Citrix Server Administration  
B. None of the listed 
C. Packager  
D. Citrix Management Console 
E. MMC  

Answer:  


73.What interface is used to Schedule ADF package installations? 

A. Citrix Packager  
B. Citrix Server Administration 
C. None of the listed  
D. Active Directory 
E. AT command  
F. Citrix Management Console 

Answer: 

74.What is the extension of the log file created by the Packager? 

A. .MSI  B. .AEP 
C. .ADF  
D. .PDF
E. .AEL  
F. .WFS 

Answer: 

75.When you want to add Registry Entries to a package you must create a batch 
file that calls the   .REG file to add the registry entries  to the server. 

A. True  
B. False 

Answer: 

76.The Recorder creates a subfolder to hold all files that were overwritten 
during a recording -    what is the default location for this folder?  

A. None of the listed 
B. Program files\Citrix\IM\Packager\Recdata  
C. Program Files\Citrix Packager\Recdata 
D. Program Files\Citrix\Log\Recdata  
E. Program Files\Citrix\Packager\Recdata 

Answer:  
77.It is possible to make a package to deploy or upgrade Internet Explorer to 
version 5.5. 

A. True 
B. False  

Answer:  

78.It is NOT possible to make a package to deploy Windows 2000 SP2 to target 
servers.  

A. False 
B. True  

Answer: 

79.When a project is created which of the following components can be added?  

A. Add Recording 
B. Add MSI file  
C. Add Compatibility Script 
D. Add Application  
E. Add Unattended Program 
F. Add Files  ACEF  

80.Which of the following best describes the Packager? 
A. installs applications via Unattended scripts  
B. monitors application installation routines 
C. schedules package installations  
D. records the changes in a script 
E. pushes applications via the Installer Service  
F. modifies the MSI file to a ADF file 

Answer: 

81.If you are making an MSI package the Packager system is not needed. 

A. False  
B. True 

Answer: 

82.The Citrix Installation Manager consists of which 3 components? 

A. Installer service  
B. MMC Plug-In 
C. MSI service  
D. Packager 
E. Network Monitor  
F. Installation Manager Plug-In 

Answer: 

83.A MetaFrame XPa version is required on the target system. 

A. False  
B. True 

Answer: 

84.Any MetaFrame version can be installed on the Packager system. 

A. False  
B. True 

Answer: 

85.Installation Manager includes enhancements to Published Applications in 
MetaFrame XPe.  

A. False 
B. True  

Answer: 
1. Which item handles the communication between MetaFrame Password Manager and 
web applications? 

A. HLLAPI 
B. SSOBHO.EXE 
C. SSOMHO.EXE 
D. AccessManager 

Answer: 

2. A user is adding a web-based application using the Logon Manager and the 
application is not included in the predefined list. What must occur before the 
user ID and password can be stored? 

A. The user must enter the name of the application. 
B. The user must enter the address into the URL-http:// field. 
C. The user must browse to the application and leave it open. 
D. The administrator must add the application to the application list in the 
console. 

Answer: 

3. Which task must be completed prior to installing the MetaFrame Password 
Manager Console? 

A. Installing the agent 
B. Configuring the agent
C. Bulk adding applications
D. Installing .NET Framework 1.1 

Answer:

4. Which three types of applications can use SendKeys? (Choose three.) 

A. Java applications 
B. Host applications 
C. Web applications 
D. .NET applications 
E. Windows applications 

Answer: 

5. Environment:* MetaFrame XP Presentation Server deploys all applications 
including a web browser.* MetaFrame Secure Access Manager is used to access all 
applications including web applications and those published on the MetaFrame XP 
Presentation Server.* User devices are WinTerms.* All devices and computers are 
in an Active Directory domain. Requirements:* Design a solution that allows 
users to logon one time to their WinTerm and have single sign on access to all 
applications.* Users gain access to MetaFrame Secure Access Manager through a 
published browser. 
Which of the following solutions will ensure that all the requirements are met? 

A. Install MetaFrame Password Manager Agent on the MetaFrame XP Presentation 
Servers.
B. Install MetaFrame Password Manager Agent on the MetaFrame Secure Access 
Manager Servers.
C. Install MetaFrame Password Manager Agent on the MetaFrame XP Presentation 
Servers and WinTerm devices. 
D. Install MetaFrame Password Manager Agent on the MetaFrame Secure Access 
Manager Servers and the MetaFrame XP Presentation Servers. 

Answer: 

6. Which statement is true about password sharing groups? 

A. Applications can only belong to a single password sharing group. 
B. Applications can belong to more than one password sharing group. 
C. Applications can only belong to a single group when synchronization services 
have not been installed. 
D. Applications can belong to more than one password sharing group only if the 
Domain Password Sharing group is not utilized. 

Answer: 

7. Which two tasks must be completed to extend the schema of a directory 
service? (Choose two.) 

A. a shared folder must be set up 
B. SSO support must be configured 
C. the CTXDOMAINPREP.EXE must be run 
D. the CTXSCHEMAPREP.VBS must be run
E. the schema must be configured to allow updates 

Answer: 

8. Which MetaFrame Password Manager feature is responsible for providing 
credentials upon request to password-protected applications? 

A. Bulk-add
B. First-time use
C. Logon Manager 
D. Intelligent Agent Response 

Answer: 

9. Which feature of MetaFrame Password Manager should be used by administrators 
to prompt users to add their credentials for a specified list of applications 
when first using the agent? 

A. Bulk-add 
B. Logon Chooser 
C. Logon Manager 
D. Intelligent Agent Response 

Answer: 

10. Assuming that Auto-Recognize is enabled, what are two ways in which the 
agent detects logon events? (Choose two.) 

A. The agent detects logon events based only on application definitions 
configured by administrators in the console. 
B. Users must configure applications using the Logon Manager so that logon 
events can be detected. 
C. For most applications, the Intelligent Agent Response detects when an 
application makes a credential request. 
D. The agent checks a launched application against information provided in the 
local credential store to determine logon events for a particular application. 

Answer: 

11. In a MetaFrame Password Manager implementation, which subcomponent acts as 
an interface between Microsoft Windows and the Agent?

A. MS CAPI
B. FTULIST.INI 
C. Logon Manager 
D. Authenticator API 

Answer: 

12. Which algorithm is used by MetaFrame Password Manager to encrypt and 
decrypt user credentials? 

A. AES 
B. RC-4 
C. RC-5 
D. Triple-DES 

Answer: 

13. Which sub-component generates and uses the primary authentication key that 
decrypts euser credentials? 

A. MS CAPI 
B. Crypto API 
C. Triple-DES 
D. Credential Manager 

Answer: 

14. Which key is stored in MS CAPI? 

A. Application name 
B. Primary authentication key
C. Application credential information
D. User question/answer information 

Answer: 

15. Where are the attributes for web applications that have been configured in 
the console stored? (Choose two.) 

A. APPLIST.INI 
B. AELIST.INI
C. ENTLIST.INI 
D. WEBLIST.INI 

Answer: 

16. What are the three layers of authentication? (Choose three.) 

A. Authenticator
B. Authenticator API
C. Authentication Event 
D. Authentication Storage 
E. Authentication Services 

Answer: 

17. During the encryption process of MetaFrame Password Manager, when is the 
primary authentication key generated? 

A. The key is generated on agent startup. 
B. The key is generated only on an as-needed basis. 
C. The key is generated during first time use of the user. 
D. The key is generated upon every logon event of the user. 

Answer: C

18. Which statement is true about the local credential store of MetaFrame 
Password Manager? 

A. It does not support roaming profiles.
B. It stores credentials in an MS Jet database. 
C. It does not support pure mandatory profiles. 
D. It is a binary MMF file located in the user's profile. 

Answer: 

19. What is required to use biometrics or token authenticators with MetaFrame 
Password Manager? 

A. a GINA chain 
B. an Active Directory
C. a customized agent install
D. Shell\EnableBiometric AdminOverride 

Answer: 

20. During the primary authentication process, which three steps must occur 
before the agent allows access to the local credential store? (Choose three.) 

A. The Authentication service confirms the password. 
B. The user provides a password to the Windows Authenticator. 
C. The Windows Authenticator API unlocks the user's encryption keys. 
D. The Windows Authenticator passes the password to the Authentication service. 
E. The Authentication service passes the confirmation to the Windows 
Authenticator API. 

Answer: 

21. How is data merged between the local credential store and the central 
credential store? 

A. By UID 
B. By session ID 
C. By date and time 
D. By validation ticket 

Answer: 

22. What does the Mainframe Helper Object use to identify a host-based 
application? 

A. SendKeys 
B. Control IDs
C. window title
D. text and coordinates 

Answer: 

23. Which two must be provided by users during their first use of MetaFrame 
Password Manager? (Choose two.) 

A. user id 
B. pin number
C. domain name 
D. user question and answer 
E. Microsoft Windows password 

Answer: 

24. Which item manages the communication between MetaFrame Password Manager and 
terminal emulators?

A. HLLAPI 
B. SSOBHO.EXE 
C. SSOMHO.EXE 
D. AccessManager 

Answer: 

25. When the Intelligent Agent Response component detects a Windows application 
logon event, which configuration file is referenced to detect the Windows 
attributes needed to authenticate users successfully? 

A. AELIST.INI 
B. FTULIST.INI 
C. APPLIST.INI 
D. ENTLIST.INI

Answer: 

26. An administrator of a MetaFrame Password Manager implementation deletes a 
question from the authentication verification list in the console. For users 
who have selected that question and stored an answer, what will happen the next 
time the user question is needed? 

A. The user will be unable to retrieve credentials. 
B. The user will be prompted to answer another question. 
C. The user will have to provide their answer to the generic question provided. 
D. The administrator will need to update the user profile manually with new 
question id and answers for those users. 

Answer: 

27. If multiple administrators are making changes to the synchronization point, 
how can administrators make sure that no changes to the console settings are 
lost? 

A. They can create a customized .MSI file. 
B. Only one administrator can connect to the synchronization point at a time. 
C. They can save the console XML file in a location accessible to all 
administrators. 
D. They can export the agent settings as a .REG file and then import it into 
another console. 

Answer: 

28. What are the three parts of the Intelligent Agent Response? (Choose three.) 

A. detecting the event 
B. determining the appropriate action 
C. decrypting the local credential store
D. encrypting the local credential storeE. responding with the correct 
credentials 

Answer: 

29. Which two tasks are completed by the Shell in a MetaFrame Password Manager 
implementation? (Choose two.) 

A. Detection of authentication events 
B. Triggering of credential synchronization 
C. Generation of the primary authentication key 
D. Decryption of data from local credential store 
E. Determining of appropriate authentication action 

Answer: 

30. What is the role of SSOBHO.EXE in the Intelligent Agent Response process? 
(Choose two.) 

A. It responds to web logon requests. 
B. It submits credentials to web applications. 
C. It monitors emulators and looks for defined matches. 
D. It detects web application attributes and determines an appropriate 
response. 

Answer: 

31. Which statement is true? 

A. Credentials are validated by the Authentication service. 
B. The Authentication service unlocks user encryption keys. 
C. Users provide their credentials directly to the Authentication service. 
D. The Authentication service fails if the system Authentication service is not 
available.

Answer: 

32. Which generates the primary authentication key? 

A. Crypto API 
B. Encryptor API 
C. Authenticator API 
D. Cryptographix service 

Answer: 

33. What generates the unique primary authentication key during a user's 
first-time use? 

A. Shell 
B. MS CAPI
C. Crypto API
D. Logon Manager 
E. Authenticator API 

Answer: 

34. Which statement best describes the Shell's role in a credential 
synchronization event? 

A. The Shell places a UID for a deleted credential in the UID list. 
B. The Shell synchronizes data whenever there is a change to the local 
credential store. 
C. The Shell monitors the local credential storage and alerts the agent when 
any data within it changes or is deleted. 
D. The Shell triggers synchronization when the agent detects inconsistencies 
between the local and central credential stores. 

Answer: 

35. Which configuration file is modified when users bulk-add applications? 

A. AELIST.INI 
B. FTULIST.INI 
C. APPLIST.INI 
D. ENTLIST.INI 

Answer: 

36. Which configuration file initially contains the information needed for the 
Intelligent Agent Response component to identify and respond to password change 
events? 

A. AELIST.INI 
B. FTULIST.INI
C. APPLIST.INI
D. ENTLIST.INI 

Answer: 

37. How can applications be added to the Logon Manager application list for 
MetaFrame Password Manager? (Choose two.) 

A. Applications and credentials are specified during the custom install of the 
agent. 
B. Logon events from the event log can be copied to the Logon Manager by local 
administrators. 
C. Users can manually add applications to the Logon Manager list by defining 
the application type and logon information. 
D. If the auto-prompt feature is enabled, MetaFrame Password Manager will 
detect logon events and prompt the user to store credentials for an 
application. 

Answer: 

38. Before Logon Manager can be used, which task must be completed? 

A. An authentication service must be specified. 
B. Primary credentials must be supplied during setup. 
C. Applications that will be used with MetaFrame Password Manager must be 
specified during setup. 
D. Applications that will be used with MetaFrame Password Manager must be 
opened on the desktop. 

Answer: 

39. Which two items are required to add a host-based application logon to the 
Logon Manager? (Choose two.) 

A. The administrator must enable Mainframe support. 
B. The application must be installed on a MetaFrame server. 
C. The application must appear in the predefined list of applications. 
D. The application logon must be auto-detected by MetaFrame Password Manager.

Answer: 

40. Which two tasks must be completed by the user before they can begin using 
the agent? (Choose two.) 

A. Configure applications 
B. Install the console onto their local system 
C. Provide Windows logon credentials to the agent 
D. Answer a pre-defined question for secondary verification 

Answer: 

41. Which statement is true about a default agent installation? 

A. Users create the list of pre-defined applications found in the Logon 
Manager. 
B. Users can add new applications to the list in the Logon Manager.
C. Users can add applications that require user ID, password, and domain to the 
Logon Manager.
D. Users can only use MetaFrame Password Manager with the pre-defined 
applications listed in Logon Manager. 

Answer: 

42. A user wants to add credentials for a Host/Mainframe application. From the 
Logon Manager, they see that the Host/Mainframe Support option is not 
available. Which best describes why this option is not available in this 
scenario? 

A. Mainframe applications have not been defined at the console. 
B. Mainframe support was not enabled during user setup of the agent. 
C. Mainframe applications are not supported by MetaFrame Password Manager. 
D. Logon Manager cannot be used to store credentials for mainframe applications.

Answer: 

43. When adding an application to the New Logon screen of the Logon Manager, 
which statement is true? 

A. A description of the application is required. 
B. Applications that require three fields for authentication can be added. 
C. Users must select the Password icon manually and enter the actual password 
in the application. 
D. Users must select the Username/ID icon manually and then click on the 
appropriate field in the application. 

Answer: 

44. An user has two sets of credentials for a secure web application. After 
adding the first set of credentials to the Logon Manager, the user makes a copy 
of the credentials. How would the user be able to edit the credentials of the 
copy to match the second set of credentials?

A. By altering the settings for the application
B. By viewing and altering information stored in the credential properties 
C. By selecting the second set of credentials in the Logon Chooser screen 
D. By turning off the Auto-Submit feature and launching the application and 
providing the second set of credentials 

Answer: 

45. Which condition must exist for users to be able to view passwords of the 
applications listed in the Logon Manager? 

A. The end-user must enable this during setup. 
B. The Auto-Prompt feature must be enabled by a user. 
C. The application must be a pre-defined application by a user. 
D. The Reveal feature must be enabled through the console by an administrator. 

Answer: 

46. Which setting in the Logon Manager properties enables the agent to 
automatically detect applications? 

A. Auto-Enter 
B. Auto-Submit 
C. Auto-Prompt 
D. Auto-Recognize

Answer: 

47. Which setting in the Logon Manager properties enables the agent to 
automatically pass credentials to the application? 

A. Auto-Enter 
B. Auto-Submit 
C. Auto-Prompt
D. Auto-Recognize

Answer: 

48. Which statement is true? 

A. The Auto-Prompt feature must be installed on an individual basis by users. 
B. The Auto-Prompt feature can be enabled or disabled by users and 
administrators. 
C. The Auto-Prompt feature must be enabled after MetaFrame Password Manager is 
installed. 
D. The Auto-Prompt feature provides logon information to an application when 
the logon information is added to Logon Manager by the user. 

Answer: 

49. Which setting enables MetaFrame Password Manager to detect when 
applications request logon information automatically?

A. Auto-Enter 
B. Auto-Detect 
C. Auto-Prompt 
D. Auto-Recognize 

Answer: 

50. Which two conditions must exist to use mandatory profiles with a MetaFrame 
Password Manager implementation? (Choose two.) 

A. The registry must be edited. 
B. NTFS partitions must be configured. 
C. Files must be stored in the Application Data folder. 
D. The Application Data folder must be placed into a writable location.
E. Folder redirection must be implemented for the Application Data folder.

Answer: 

51. A company has configured a password policy for an application that requires 
eight characters with a maximum of two numeric characters. The MetaFrame 
Password Manager administrator wants to add a MetaFrame Password Manager 
password generation policy to include this application. Which password 
generation policy would never fail? 

A. a maximum of nine characters with special characters allowed 
B. a minimum of eight characters with numeric characters supported 
C. a minimum of nine characters with one numeric character allowed 
D. a maximum of eight characters with two special characters allowed 

Answer: 

52. A user has configured applications to work with MetaFrame Password Manager. 
The user complains that when passwordprotected applications, which are not 
included in the application list, are launched, the user is not prompted to add 
this application to the list. Which choice best describes why this occurs? 

A. The user has disabled the Auto-Logon feature 
B. The user has disabled the Auto-Submit feature. 
C. The user has disabled the Auto-Prompt feature. 
D. The user has disabled the Auto-Recognize feature. 

Answer: 

53. What is the purpose of the timer setting in the Logon Manager? 

A. It determines session time 
B. It determines the elapsed time before re-authentication 
C. It determines the amount of time between synchronization events. 
D. It determines the elasped time in which the agent supplies credentials to an 
application. 

Answer: 

54. You have a system that has Windows 2000 Server installed. Which additional 
software is required before installing MetaFrame Password Manager Console? 

A. Java Virtual Machine 
B. Microsoft SQL Server 
C. Microsoft .NET Framework 1.1 
D. MetaFrame XP Presentation Server

Answer: 

55. Which three of the following platforms are supported for use with the 
MetaFrame Password Manager Console? (Choose three.) 

A. Microsoft Windows ME 
B. Microsoft Windows Server 2003 
C. Microsoft Windows NT Server 4.0 
D. Microsoft Windows XP Professional 
E. Microsoft Windows 2000 Professional 

Answer: 

56. What is the additional memory requirement for the MetaFrame Password 
Management Console only? 

A. 32MB RAM
B. 48MB RAM
C. 64MB RAM 
D. 128MB RAM 

Answer: 

57. Where should the console be installed? 

A. In the same location as the agent 
B. In the same location as the applications 
C. In the same location as the local credential store 
D. In the same location as the central credential store 

Answer: 

58. Why should the console be installed in the same location as that of the 
applications? 

A. To ensure that the AELIST.INI file is created 
B. To ensure that the APPLIST.INI file is created 
C. To eliminate the need to configure application definitions 
D. To eliminate inconsistencies that occur with application definitions due to 
operating system differences 

Answer: 

59. An administrator has designated the global error detection settings for 
Windows applications as the following: 
Logon Timeout (sec): 90 Max Retries:2 Hide :Confirm Password:DefaultMask 
Password:yesRequired result:The finance department has business critical 
Windows applications for which you would like to limit the Logon Timeout to 30 
seconds and have the Max Retries set to one or (1). Desired Result: All other 
Windows applications should retain the administrator configured settings listed 
above. Which configuration would give the administrator the desired and 
required result? 

A. Select the default settings at the application-level error detection for all 
applications. 
B. Alter the global error detection settings for applications to accept the 
default settings for all error detection. 
C. Change the global error detection settings for applications to accept the 
default for Logon Timeout and Max Retries. 
D. Specify that the application-level error detection setting for the finance 
applications have Logon Timeout set at 30 and Max Retries set at one or 1. 

Answer: 

60. Which form type should be used by administrators when defining new 
applications in the console? 

A. Logon 
B. EntList 
C. New Logon 
D. Text match criteria 

Answer: 

61. Which two are needed to create host-based application definitions? (Choose 
two.) 

A. SSOBHO.EXE 
B. A terminal emulator that supports HLLAPI 
C. MetaFrame Presentation Server for UNIX 
D. The MetaFrame Password Manager Console
E. The MetaFrame Password Manager Logon Manager

Answer:  

62. Which two can be used to create web application definitions in the 
MetaFrame Password Manager Console? (Choose two.) 

A. Forms 
B. XML script 
C. Text strings 
D. Pop-up dialogs 
E. Web emulators 

Answer:

63. When configuring a host application, how can the prekey perform the "enter" 
function?

A. Type Enter into the keys to precede first field 
B. By manually deleting the @T key from the dialog box 
C. By manually typing the @R (return) key into the console 
D. By clicking the "Use Enter instead of Tab" button in the console 

Answer: 

64. When must administrators create web application definitions? 

A. For all web applications 
B. For published web applications 
C. For web applications that do not have templates 
D. For web applications that have more than two credential fields

Answer: 

65. What is the browser requirement for the Web Browser SSO Helper Object? 

A. Internet Explorer 5.5 
B. Netscape Navigator 7.1 
C. Internet Explorer 6.0 SP2 
D. Netscape Communicator 4.8 

Answer: 

66. When configuring a web application that has more than two logon fields, 
where in the console can administrators specify criteria to distinguish between 
forms? 

A. General tab
B. Matching tab
C. Web Form Wizard 
D. Add Application Wizard 

Answer: 

67. When configuring a web application that has more than two logon fields, 
which three criteria can be specified? (Choose three.) 

A. Text 
B. Rows 
C. Attribute 
D. Columns 
E. HTML tags 

Answer: 

68. Application definitions for Windows applications are created using _____. 
(Fill in the blank with an option from below.) 

A. forms 
B. SendKeys 
C. window titles 
D. virtual key codes

Answer:  

69. How are .NET applications configured in the MetaFrame Password Manager 
Console? 

A. as host applications 
B. as Web applications 
C. as .NET applications
D. as Windows applications

Answer: 

70. For Java applications, which attribute can be used for logon events? 

A. Site 
B. Realm 
C. Control ID 
D. SendKeys

Answer: 

71. Which three attributes of Windows applications are detected by the 
Intelligent Agent Response in MetaFrame Password Manager? (Choose three.)

A. Control ID
B. Window title 
C. Application name 
D. Frame and form name 
E. User name and password field 

Answer: 

72. An administrator wants to enable Mainframe support in MetaFrame Password 
Manager. What are two ways this feature is enabled? (Choose two.) 

A. Administrators can use the console to allow users to enable this feature. 
B. Administrators and users can enable this feature from the Agent Settings.
C. Administrators can enable this feature through a custom agent installation.
D. Administrators can enable this feature by accessing the Host/Mainframe tab 
in the Agent Settings. 

Answer: 

73. Which value must be configured when using a web application template? 

A. URL 
B. Realm 
C. Form name 
D. Frame name 

Answer: 

74. Which three can be used to create an application definition? (Choose three.)

A. Templates 
B. APPLIST.INI 
C. AccessManager 
D. Manual configuration 
E. Add Application Wizard 

Answer: 

75. Which two tabs in the console can administrators access to create a list of 
applications that users will be prompted to add logons for during their first 
time use of the agent? (Choose two.) 

A. General tab 
B. Bulk-Add tab
C. Miscellaneous tab
D. Application list tab 

Answer:

76. An administrator has just added a new application to the Bulk-Add list for 
users of enterprise resources. How is this revision to the application list 
recorded? 

A. It is recorded in the directory.
B. It is recorded by the version stamp. 
C. The revision is recorded on the local credential store. 
D. The new application is recorded to the ENTLIST.INI file. 

Answer: 

77. Which three options are configurable for application definitions? (Choose 
three.)

A. error detection 
B. reveal password 
C. password change 
D. first-time-use settings 
E. confirmation questions 

Answer: 


78. When configuring an application it is important that the application be 
_____. (Fill in the blank with an option from below.) 

A. installed in the same place as the agent. 
B. listed in the application list if the console. 
C. published on a MetaFrame XP Presentation Server. 
D. running on the same operating system as the agent.

Answer: 

79. What are two ways to configure RetryTimeout settings? (Choose two.) 

A. Manually 
B. Per application 
C. By application type 
D. Per defined application 

Answer: 

80. What are two default options for applications that are included in the 
MetaFrame Password Manager Console application list? (Choose two.)

A. Mask the password
B. 30 seconds for RetryTimeout 
C. 15 seconds for RetryTimeout 
D. Hide the confirmation password field 

Answer:

81. Which miscellaneous setting should be used to add an additional layer of 
security to applications? 

A. Auto-submit 
B. Service logon 
C. Force reauthentication 
D. Allow reveal password 

Answer: 

82. An administrator has just implemented MetaFrame Password Manager for his 
enterprise. Remote users authenticate to the network by using RSA tokens. What 
must be configured in the console settings to allow dynamic password usage, 
such as in the scenario above? 

A. Auto-submit needs to be disabled. 
B. Service logon needs to be configured. 
C. Force reauthentication needs to be turned off. 
D. A third field label needs to be added to the application definition. 

Answer: 


83. An administrator will implement MetaFrame Password Manager to provide SSO 
for users who access published applications usingweb interface for MetaFrame XP 
Presentation Server. Users currently access applications through a browser 
using an ICA client. Remote connections are secured through the use of secure 
gateway for MetaFrame XP Presentation Server. In which location should the 
agent be installed for this deployment scenario? 

A. On the server running the Secure Gateway service 
B. On the web interface for MetaFrame XP web server 
C. On each MetaFrame XP Presentation Server in the farm 
D. On the system with the Secure Ticketing Authority installed

Answer:  

84. An administrator will implement MetaFrame Password Manager to provide SSO 
for users who access published applications on MetaFrame XP Presentation 
Servers . Users currently access applications through Program Neighborhood. 
Remote users connect through a VPN. Where should the agent be installed for 
this deployment scenario?

A. On the system hosting the VPN
B. On the local system of each user 
C. On the web interface for MetaFrame XP Web Server 
D. On each MetaFrame XP Presentation Server in the farm 

Answer: 

85. A network consists of the following:* MetaFrame XP Presentation Server is 
used to deploy all applications.* web interface which is used as the access 
mechanism* All user workstations are Windows 2000 Professional and Windows XP 
Professional.* All workstations are in an Active Directory domain. MetaFrame 
Secure Access Manager is not used in the network.Required Results:The 
administrator must design a solution that allows users to logon one time to 
their workstation and have single sign on capabilities to all MetaFrame XP 
Presentation Server deployed applications. Users will leverage the desktop 
credential pass-through feature to authenticate to the web interface website. 
Which solution produces the required results? 

A. Install MetaFrame Password Manager Agent on the user's workstations only. 
B. Install MetaFrame Password Manager Agent on the web interface servers only. 
C. Install MetaFrame Password Manager Agent on the MetaFrame XP Presentation 
Servers only. 
D. Install MetaFrame Password Manager Agent on the user's workstations and 
MetaFrame XP Presentation Servers. 

Answer: 

86. A network consists of:* MetaFrame XP Presentation Server is used to deploy 
all applications.* MetaFrame Secure Access Manager is used to access web 
applications and MetaFrame XP Presentation Server published applications.* All 
user workstations are Windows 2000 Professional and Windows XP Professional.* 
All workstations are in the same Active Directory domain. Required Results: The 
administrator must design a solution that allows users to logon one time to 
their workstation and have single sign on to all MetaFrame Secure Access 
Manager web applications. Desired Results: SSO capability should be enabled for 
MetaFrame XP Presentation deployed applications as well. Proposed Solution:The 
administrator installs the MetaFrame Password Manager Agent on to the MetaFrame 
XP Presentation Servers and theworkstations. Which results does the proposed 
solution produce? 

A. The proposed solution produces both the required and desired results. 
B. The proposed solution produces the require but not the desired results. 
C. The proposed solution does not produce any of the required or desired 
results. 
D. The proposed solution produces the desired results but not the required 
results. 

Answer: 

87. Environment: An organization's network consists of MetaFrame XP 
Presentation Servers to deploy applications. MetaFrame Secure Access Manageris 
used to access web and published applications. User workstations are running 
Windows 2000 Professional and Windows XPProfessional. All computers are in an 
Active Directory domain. The organization has three geographic regions: A 
headquarters in the US, a regional office in Europe, and an office in the Asia 
Pacific . Users are located in all three regions and server farms exist in all 
three regions. Users are permitted to access applications from all MetaFrame XP 
Presentation Servers regardless of location. Mandatory profiles will be used 
for all applications deployed by MetaFrame XP Presentation Server. 
Configurations:MetaFrame Password Manager Agent is installed on the MetaFrame 
XP Presentation Servers and user workstations. Active Directory synchronization 
is setup. Which two results will the configurations have on the environment 
described above? (Choose two.) 

A. Users will have single sign on enabled to access all MetaFrame Secure Access 
Manager web applications. 
B. Users will have single sign on enabled to access all MetaFrame XP 
Presentation Server deployed applications in their region only. 
C. Users who accessi MetaFrame XP Presentation Servers in all regions 
regardless of the user's location will have single sign onenabled.
D. Users will have single sign on access to MetaFrame deployed applications 
only. 

Answer:

88. An administrator creates an application definition on a Windows 2000 Server 
and sends it to the synchronization point. Users who use the agent on Windows 
XP Professional systems are complaining that the agent is not working for that 
application. What went wrong? 

A. Users do not have administrator privileges. 
B. The agents are not synchronizing correctly. 
C. The latest service pack is not installed on the agent systems. 
D. The application definition was not created for the correct operating system. 

Answer: 

89. In a pure MetaFrame XP Presentation Server deployment, which three 
components must be present? (Choose three.) 

A. Central credential storage 
B. Client workstation with an ICA client installed 
C. A MetaFrame XP Presentation Server with the agent installed 
D. A MetaFrame XP Presentation Server with the console installed 

Answer: 

90. When the MetaFrame Password Manager Agent is installed on the client device 
and on the MetaFrame XP Presentation Server, this deployment is known as a 
_____. (Fill in the blank with an option from below.) 

A. pure MetaFrame XP Presentation Server deployment
B. combined MetaFrame XP Presentation Server deployment
C. consolidated MetaFrame XP Presentation Server deployment 
D. mixed environment MetaFrame XP Presentation Server deployment 

Answer: 

91. Which statement describes a pure MetaFrame XP Presentation Server 
deployment? 

A. The MetaFrame Password Agent is installed only on the client devices. 
B. The MetaFrame Password Console is installed only on the client devices. 
C. The MetaFrame Password Agent is installed only on the MetaFrame XP 
Presentation Servers. 
D. The MetaFrame Password Console is installed only on the MetaFrame XP 
Presentation Servers. 

Answer: 



92. Which file ensures the agent launches before a published application within 
a MetaFrame XP Presentation Server session? 

A. SSOAGENT.EXE 
B. SSOPUPAPP.EXE 
C. SSOCONSOLE.EXE 
D. SSOLAUNCHER.EXE 

Answer: 

93. In a server farm with three load-balanced MetaFrame XP Presentation 
Servers, where should you install the agent? 

A. On all three servers 
B. On the user desktops 
C. On the server with the least load
D. On the MetaFrame XP Presentation Server hosting the data store

Answer:  

94. What is the syntax to publish an application called c:\gundy\TEST.EXE when 
the agent on a MetaFrame XP Presentation Server is not enabled for all 
applications? (Assume that the agent is installed in the default location.) 

A. c:\gundy\TEST.EXE /nossoshutdown 
B. c:\gundy\TEST.EXE c:\program files\citrix\metaframe password 
manager\wts\SSOLAUNCHER.EXE
C. "c:\program files\citrix\metaframe password manager\wts\SSOLAUNCHER.EXE" 
/publish c:\gundy\TEST.EXE 
D. "c:\program files\citrix\metaframe password manager\wts\SSOLAUNCHER.EXE" 
/application c:\gundy\TEST.EXE 

Answer: 

95. Which statement is true for MetaFrame Password Manager password policies? 

A. MetaFrame Password Manager Password policies are merged into the registry.
B. MetaFrame Password Manager Password policies enforce password expiration 
requirements.
C. MetaFrame Password Manager Password policies use the Active Directory Group 
Policy engine. 
D. MetaFrame Password Manager Password policies manage character generation for 
passwords. 

Answer: 

96. Which of the following types of characters support an exclusion list? 

A. uppercase letters 
B. lowercase letters 
C. special characters 
D. numeric characters 

Answer: 

97. What is the maximum password length supported by MetaFrame Password Manager 
policies? 

A. 10 characters 
B. 128 characters 
C. 255 characters 
D. Eight characters 

Answer: 


98. What is the default password length of MetaFrame Password Manager? 

A. 10 characters 
B. 128 characters 
C. 256 characters
D. Eight characters

Answer: 

99. Which type of object can have password policies assigned to it? 

A. users 
B. groups 
C. servers 
D. applications 

Answer: 

100. What are two reasons for using password sharing groups? (Choose two.) 

A. to simplify password policy delivery
B. to avoid the need for using complex policies
C. to group applications that share backend authentication 
D. to group applications regardless of backend authentication 

Answer:

101. Your manager would like you to enable password sharing groups for your 
company's applications that prompt for credentials. Which two applications 
would you likely assign to the Domain password sharing group for the Windows 
2003 domain? (Choose two.) 

A. an Intranet web site 
B. an Internet web site 
C. personal webmail accounts with an ISP 
D. an Active Directory enabled HR application
E. personal Instant Messaging clients with an ISP

Answer: 

102. What is the domain password sharing group used for? 

A. applications that share the same users 
B. applications that share the same configurations 
C. applications that share the same load-managed group
D. applications that share the same password as the Windows password 

Answer: 

103. A user changes the password for a Windows application that is a member of 
a password sharing group. The next time the user attempts to log on to another 
application within the same password sharing group, what happens? 

A. The user question is displayed.
B. The user is logged in successfully.
C. The Change Password Wizard is displayed. 
D. The user is prompted for their new password. 

Answer: 

104. Which agent setting in the console sets the number of domain levels used 
as the matching criteria? 

A. AutoLogin 
B. DefaultPolicy 
C. DNLevelsToMatch 
D. LogonManagerColumns 

Answer: 

105. Which Agent Setting in the console can be used to disable the automatic 
submission of credentials during initial application configuration? 

A. AutoLogon 
B. AutoLogonDelay 
C. LogonAfterConfig 
D. AutoLoginAfterConfig 

Answer: 

106. Which agent setting in the console controls whether or not users are 
notified if a synchronization event fails while the user is working offline? 

A. NotifyFail
B. OfflineNotification
C. DNLevelsToMatch 
D. WorkDisconnected 

Answer: 

107. Company policy requires that no credentials remain stored locally on a 
workstation after a user logs off. Which agent setting must be enabled to 
conform to the company policy? 

A. DeleteOnShutdown 
B. CleanUpOnShutdown 
C. DeleteOnLogoff 
D. DeleteProfile 

Answer: 

108. An administrator has configured the agent to delete the local credential 
store. Which two events would result from this configuration? (Choose two.) 

A. File-level synchronization on agent startup 
B. Record-level synchronization on agent startup 
C. Record-level synchronization on agent shutdown 
D. User access to the central credential store maintained when offline 

Answer: 

109. Which statement about the agent setting SyncInterval is true? 

A. SyncInterval can be defined by a user in the agent.
B. Synchronization is dependent on a user-generated event.
C. SynchInterval only works when used in combination with AgressiveSync. 
D. SynchInterval It sets the interval (in minutes) between automatic 
re-synchronization. 

Answer: 

110. When a user is working with a published application, which setting can be 
enabled to reveal the computer name of the MetaFrame XP Presentation Server to 
the user via the agent system tray icon?

A. IdentifyNew 
B. AllowReveal 
C. RevealComputerName 
D. DisplayComputerName 

Answer: 

111. What is a justification for using Active Directory as the central 
credential store? 

A. There are multiple domains. 
B. Users require different agent settings. 
C. Mandatory profiles are used in the environment. 
D. There are a large number of users in the environment. 

Answer: 

112. When using a shared folder as the central credential store, where should 
the share be located? 

A. on the web server 
B. on the agent server 
C. on the MetaFrame XP Presentation Server 
D. on a system in the same domain as the agents

Answer: 

113. What are three requirements for using a shared folder as the central 
credential store? (Choose three.) 

A. Administrators must have full control permissions to the share. 
B. All users must have full control permissions to the share. 
C. The shared folder needs to be a UNC path with Windows NT file support. 
D. The CTXFILESYNCPREP.EXE utility should be run on the system hosting the 
share. 
E. The system hosting the shared folder should be in the same domain as the 
agents that it will synchronize. 

Answer:

114. Your company has implemented MetaFrame Password Manager. The administrator 
has run CTXFILESYNCPREP.EXE with noparameters on a server named "Pres1". All 
components including the agents reside in the "develop" domain. When connecting 
with the central credential store from the console which path is specified?

A. \\CTXSYNC\pres1 
B. \\develop\CTXSYNC 
C. \\Pres1\CITRIXSYNC$ 
D. \\develop\pres1\CITRIXSYNC$ 

Answer: 

115. Active Directory can be used as the central credential store. Before 
administering the directory service through the console, administrators must 
perform which two tasks? (Choose two.) 

A. extend the schema 
B. prepare the domain for credential synchronization
C. created a GPO for MetaFrame Password Manager
D. setup a new OU for MetaFrame Password Manager 
E. synchronize with local credential stores in the domain 

Answer:

116. From which node in the console can you connect to the central credential 
store? 

A. Directory 
B. Applications 
C. Agent Settings 
D. Password Sharing Groups 

Answer: 



117. Which utility would the domain administrator use to provide all users in 
the domain with the permissions needed to create, modify, and delete their SSO 
objects? 

A. CTXUSERPREP.EXE 
B. CTXDOMAINPREP.EXE 
C. CTXFILESYNCPREP.EXE 
D. cscript CTXSCHEMAPREP.VBS

Answer: 

118. Which central credential store requires the schema to be extended? 

A. Database 
B. Shared folder 
C. License repository
D. Microsoft Active Directory

Answer: 

119. Which Windows security group must a user be a member of in order to run 
the schema extension utility found in the Tools directory of the MetaFrame 
Password Manager CD? 

A. Administrators 
B. Domain Admins 
C. Schema Admins 
D. Server Operators 

Answer:

120. Given a system where E:\ represents a CDROM drive and C:\ is the local 
system drive, what is the correct choice for using the schema extension utility 
located in the Tools directory? 

A. E:>cscript CTXSCHEMAPREP.VBS 
B. C:>cscript CTXSCHEMAPREP.VBS 
C. E:\Tools\>cscript CTXSCHEMAPREP.VBS 
D. C:>E:\Tools\cscript CTXSCHEMAPREP.VBS 

Answer: 

121. Which Windows 2000 registry key needs to have its DWORD value set to 1 in 
order to allow the administrator to extend the schema? 

A. Update Schema 
B. Allow Update Schema
C. Schema Update Allowed
D. Allow Schema Extension Update 

Answer: 

122. What is the CTXMPMSCHEMA.XML used for? 

A. It extends the schema. 
B. It sets domain permissions for users. 
C. It displays details of a user's .MMF file. 
D. It contains details about the schema extension. 

Answer: 



123. During startup, what happens if a change is detected in the local 
credential store but not in the central credential store?

A. The agent will merge the local credential store with the central credential 
store. 
B. Logon will fail and synchronization must be manually forced by the 
administrator. 
C. The central credential store will override the changed file in the local 
credential store. 
D. The user will be asked to confirm their identity by answering a pre-defined 
question. 

Answer: 

124. What is necessary to allow users to log on simultaneously from multiple 
systems? 

A. Authenticator API 
B. File-level synchronization 
C. Record-level synchronization 
D. Unique Identifier List (UID List) 

Answer: 

125. To ensure that synchronization occurs correctly, when using a shared 
folder as the central credential store, what is required? 

A. SyncManager settings need to be configured and deployed. 
B. The account used to connect to the share requires full control to the shared 
drive. 
C. The CTXDOMAINPREP.VBS script should be run to prepare the domain for 
credential synchronization. 
D. The administrative account for the system that hosts the console should be 
used to authenticate to the share.

Answer: 

126. How can an administrator check that credential synchronization is working 
when a shared folder is used as the central credential store? 

A. Check the registry file with the same name as the console system. 
B. Import agent setting into the console and compare to settings in the 
ENTLIST.INI file.
C. Export the console settings and launch them from another system with a 
console installed.
D. Send an ADMINOVERRIDE to the synchronization point and verify that the 
change has occurred at the agent. 

Answer: 

127. Which two options can be used as a license repository? (Choose two.) 

A. shared folder 
B. local credential store 
C. central credential store 
D. Active Directory container 
E. Microsoft Access database 

Answer: 

128. Which tool can be used to configure an Active Directory container to be 
used as a license repository for MetaFrame Password Manager? 

A. CTXDOMAINPREP.EXE 
B. CTXFILESYNCPREP.EXE 
C. CTXSCHEMAPREP.VBS 
D. MetaFrame Password Manager Console 

Answer: 

129. What must be done in order to use an Active Directory container as the 
license repository? 

A. The schema must be extended. 
B. The type of license to be used must be determined.
C. License numbers must be added to the License Administration tool.
D. Licenses must be activated using the Citrix Activation System. 

Answer: 

130. Before using an Active Directory container as the licensing repository, 
the CTXSCHEMAPREP.VBS script must be run. What does this script do? 

A. It extends the Active Directory schema. 
B. It defines the type of license to be used. 
C. It edits the registry to allow for a schema update. 
D. It configures the container for use with MetaFrame Password Manager. 

Answer: 

131. What type of information should be provided when configuring a shared 
folder as the license repository? 

A. the type of license 
B. the administrator password 
C. the shared folder permissions 
D. the UNC path of the shared folder 

Answer: 

132. Which statement is true about the license repository for MetaFrame 
Password Manager? 

A. Licenses are stored in both the central credential store and the license 
repository. 
B. If multiple consoles are installed, only one console needs to have access to 
the license repository. 
C. Administrators can use either a shared folder or an Active Directory 
container as the license repository.
D. The same mechanism that is used for the central credential store must be 
used for the license repository.

Answer: 

133. Which two statements are true about the MetaFrame Password Manager License 
Administration tool? (Choose two.) 

A. This tool is dependent on the console. 
B. This tool can be used to specify the location of the license repository. 
C. If multiple consoles exist, this tool is only available on one console.
D. Multiple instances of this tool should not be run at the same time. 

Answer: 

134. Which license type is used in scenarios in which licenses are pooled and 
used by multiple users? 

A. shared license 
B. named user license
C. connected product license
D. concurrent-connected user license 

Answer: 

135. When using named user type licensing, how are users defined? 

A. by user id 
B. by session id 
C. by server farm 
D. by domain name 

Answer: 



136. What is a true statement regarding MetaFrame Password Manager licensing?

A. Only one license type is available. 
B. Concurrent-connected user licenses are permanently assigned to users. 
C. Named-user licenses cannot be shared by multiple users. 
D. Named-user licensing can only be used when an Active Directory container is 
used as the license repository. 

Answer: 

Other related posts: